home.aspx
 
EVENTS

Global CISO Executive Summit
GLOBAL CISO EXECUTIVE SUMMIT
September 21-23, 2020
The Governing Body of CISOs who create the agenda understand that there is 'strength in numbers,' and the challenges and opportunities faced by one organization are echoed across many. Through collaboration with our peers, this conference enables us to take advantage of the power of exponent...

Global Security Exchange (GSX) 2020
GLOBAL SECURITY EXCHANGE (GSX) 2020
September 21-23, 2020
Powered by ASIS International, Global Security Exchange (GSX) multiplies access to the expertise, connections, and innovations our community of global security professionals need to serve as valued leaders and trusted advisors in today’s complex and rapidly evolving enterprise security risk la...

Apphaz

SHARESHARESHARE
Apphaz is a consulting services firm based out of US in the offensive security space. Apphaz offers leading and cutting edge services with specializations in web application & web services/API security, mobile application security, infrastructure/network security, client application security, red teaming, secure code reviews and compliance. We believe that security advice should be straightforward and delivered without drama. Most importantly, that our approach to security should take the specific risks faced by you into account, in the context of your individual circumstances.
SHARESHARESHARE

RELATED NEWS


Hacked internet-connected toy maker VTech has finally relaunched its online app store more than two months after attackers broke into its site and stole the personal details of almost 5 million customers....
THEGUARDIAN
READ MORE

Notorious North Korean hackers are using a new Trojan in their attacks, the United States Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) warned on Wednesday. Referred to as Lazarus, BlueNoroff, and Hidden Cobra and said to be backed by the North Korean government, the group is believed to have orchestrated a number of high-profile attacks, including the Bangladesh central bank heist and assaults on numerous financial organizations. Over the past couple of years, ...
SECURITYWEEK
READ MORE

The European Parliament has approved plans to boost physical security by implementing a mass identity database, although privacy concerns persist. The Common Identity Repository (CIR) will centralize the personal information of nearly all non-EU citizens in the EU’s visa-free Schengen region. The latter covers the vast majority of the EU except for Ireland and the UK, as well as Bulgaria, Croatia, Cyprus, and Romania. The data — which will include fingerprints, names, addresses, phot...
INFOSECURITY MAGAZINE
READ MORE

Tech support scammers are known for their cheek -- making unfounded claims that PCs are infected to scare consumers into parting with their money -- but a Symantec partner took nerve to a new level, a security company claimed last week....
COMPUTERWORLD
READ MORE

The FBI has warned WordPress users to patch any plug-in vulnerabilities or risk having their sites taken over and defaced by ISIS sympathizers....
INFOSECURITY MAGAZINE
READ MORE

Russia has been accused of having hacked the Danish Ministry of Defense and gained access to its employees’ emails in 2015 and 2016, local media reported on Sunday. Defense Minister Claus Hjort Frederiksen was quoted by Danish news agency Ritzau as saying that the group behind the hacking is linked to the Russian intelligence services....
THE FILIPINO TIMES
READ MORE

EVENTS

Global Security Exchange (GSX) 2020
GLOBAL SECURITY EXCHANGE (GSX) 2020
September 21-23, 2020
Powered by ASIS International, Global Security Exchange (GSX) multiplies access to the expertise, connections, and innovations our community of global security professionals need to serve as valued leaders and trusted advisors in today’s complex and rapidly evolving enterprise security risk la...

Global CISO Executive Summit
GLOBAL CISO EXECUTIVE SUMMIT
September 21-23, 2020
The Governing Body of CISOs who create the agenda understand that there is 'strength in numbers,' and the challenges and opportunities faced by one organization are echoed across many. Through collaboration with our peers, this conference enables us to take advantage of the power of exponent...